Using Nix to Fuzz Test a PDF Parser (Part One) # FuzzTesting #Nix #PDFParser #Honggfuzz #Workflow https://mtlynch.io/nix-fuzz-testing-1/
mtlynch.io
Using Nix to Fuzz Test a PDF Parser (Part One)
Fuzz testing is a technique for automatically uncovering bugs in software. The problem is that it’s a pain to set up. Read any fuzz testing tutorial, and the first task is an hour of building tools from source and chasing down dependencies upon dependencies.…
🔥2
The Red Dragon Searches for Pearls Through Quantum Tunneling – But You’ve Got the Wrong Paper #RedDragon #QuantumTunneling #SymmetricCryptography #NIST #AES https://nattothoughts.substack.com/p/chinas-quantum-tunneling-breakthrough
Natto Thoughts
The Red Dragon Searches for Pearls Through Quantum Tunneling – But You’ve Got the Wrong Paper
A September paper, soon hushed up, shows Chinese researchers may have discovered a class of quantum-annealing algorithm capable of attacking cryptography in a novel way
The Crypto Game of Lazarus APT: Investors vs. Zero-days #LazarusAPT #CryptocurrencyTheft #MOBAgame #ZeroDayExploit #GoogleChromeVulnerability https://securelist.com/lazarus-apt-steals-crypto-with-a-tank-game/114282/
Securelist
Lazarus APT steals cryptocurrency and user data via a decoy MOBA game
Kaspersky GReAT experts break down the new campaign of Lazarus APT which uses social engineering and exploits a zero-day vulnerability in Google Chrome for financial gain.
Sysdig 2024 Global Threat Report #SysdigThreatReport #GartnerMarketGuide #Frost&SullivanAward #SysdigSage #CloudSecurityInsights https://sysdig.com/blog/sysdig-2024-global-threat-report/
Sysdig
Sysdig 2024 Global Threat Report | Sysdig
We know that cloud attacks happen very quickly. Our 2024 global threat year-in-review, the third annual threat report from the Sysdig Threat Research Team
Vulnerabilities of Realtek SD card reader driver, part 1 #RealtekVulnerabilities #SDCardReader #DMAVulnerability #KernelMemoryLeak #PCIConfigSpaceAccess https://zwclose.github.io/2024/10/14/rtsper1.html
ZwClose
Vulnerabilities of Realtek SD card reader driver, part 1
I discovered multiple vulnerabilities in RtsPer.sys, an SD card reader driver developed by Realtek. These vulnerabilities enable non-privileged users to leak the contents of kernel pool and kernel stack, write to arbitrary kernel memory, and, the most interesting…
LLM Security: Playing with ChatGPT code execution capability (Part 1) #LLMSecurity #ChatGPT #CodeExecution #Python #Obfuscation https://mohitdabas.wordpress.com/2024/10/25/llm-security-playing-with-chatgpt-code-execution-capability-part-1/
Mohit Dabas's Blog
LLM Security: Playing with ChatGPT code execution capability (Part 1).
So we all know about the ChatGPT4 code execution capability. Now the question is can I execute a little bit offensive code like running netstat to see internal connections? I tried to run ‘ne…
👍1
CVE-2024-26926 Analysis #LinuxKernel #CVE202426926 #Analysis #GitHub #SecurityVulnerabilities https://github.com/MaherAzzouzi/LinuxKernel-nday/blob/main/CVE-2024-26926/CVE_2024_26926_Analysis.pdf
GitHub
LinuxKernel-nday/CVE-2024-26926/CVE_2024_26926_Analysis.pdf at main · MaherAzzouzi/LinuxKernel-nday
Linux Kernel N-day Exploit/Analysis. Contribute to MaherAzzouzi/LinuxKernel-nday development by creating an account on GitHub.
👍1
Retrofitting encrypted firmware is a Bad Idea™ #FirmwareEncryption #PrinterHacking #WTM #Lexmark #SecurityPolicy https://haxx.in/posts/wtm-wtf/
haxx.in
Retrofitting encrypted firmware is a Bad Idea™
Lexmark decided to frustrate vulnerability researchers last minute. Let’s have a look at their new root filesystem encryption.
Introducing zizmor: now you can have beautiful clean workflows #Rust #Security #GitHubActions #workflows #development https://blog.yossarian.net/2024/10/27/Now-you-can-have-beautiful-clean-workflows
blog.yossarian.net
Introducing zizmor: now you can have beautiful clean workflows
Anatomy of an LLM RCE #LLM #RCE #Security #CodeExecution #Vulnerability https://www.cyberark.com/resources/threat-research-blog/anatomy-of-an-llm-rce
Cyberark
Anatomy of an LLM RCE
As large language models (LLMs) become more advanced and are granted additional capabilities by developers, security risks increase dramatically. Manipulated LLMs are no longer just a risk of...
Mastering Memory Exploitation: Fundamentals, Stack Overflows, Shellcode, Format String Bugs, and Heap Overflows #MemoryExploitation #Cybersecurity #Vulnerabilities #TechGuide #ExploitationTechniques https://medium.com/@verylazytech/mastering-memory-exploitation-fundamentals-stack-overflows-shellcode-format-string-bugs-and-353270ec8128
Medium
Mastering Memory Exploitation: Fundamentals, Stack Overflows, Shellcode, Format String Bugs, and Heap Overflows
In the world of cybersecurity, exploiting vulnerabilities is a technical art form that combines deep knowledge of systems with a practical…
🔥2🤔1💩1🥱1
Cracking into a Just Eat / Takeaway.com terminal with an NFC card #JustEat #Takeaway.com #NFCcard #TerminalCracking #AndroidExploit https://blog.mgdproductions.com/justeat-takeaway-terminal/
MGD Blog
Cracking into a Just Eat / Takeaway.com terminal with an NFC card
So this is a pretty interesting one, i found this one on a local marketplace for 25 dollars, so i immediately snagged it up.
After it booted up, it showed an activation screen. Looks like the previous owner has logged out.
We can't do much from this screen…
After it booted up, it showed an activation screen. Looks like the previous owner has logged out.
We can't do much from this screen…
Give Me the Green Light Part 2: Dirty Little Secrets #TrafficController #DirtyLittleSecrets #WebAppPentesting #SNMP #NTCIP https://www.redthreatsec.com/blog/give-me-the-green-light-part2-dirty-little-secrets
Red Threat
Give Me the Green Light Part 2: Dirty Little Secrets — Red Threat
A peek behind the curtain and an introduction to the protocol the Traffic Industry doesn’t want you to know about.
Exploiting a Blind Format String Vulnerability in Modern Binaries: A Case Study from Pwn2Own Ireland 2024 #ExploitSuccess #BlindExploitation #StackPointer #WritingToStack #RopChain https://www.synacktiv.com/publications/exploiting-a-blind-format-string-vulnerability-in-modern-binaries-a-case-study-from
Synacktiv
Exploiting a Blind Format String Vulnerability in Modern Binaries: A
🔥2🤯2👍1
Understanding RedLine Stealer: The Trojan Targeting Your Data #RedLineStealer #Trojan #MalwareAnalysis #DataTheft #Cybersecurity https://malwr-analysis.com/2024/08/22/understanding-redline-stealer-the-trojan-targeting-your-data/
Malware Analysis, Phishing, and Email Scams
Understanding RedLine Stealer: The Trojan Targeting Your Data
In the ever-evolving landscape of cybersecurity threats, one name has increasingly become synonymous with stealth and precision: RedLine Stealer. This malicious software, often referred to as a Tro…
Autonomous Discovery of Critical Zero-Days #ZeroPathBlog #AI #VulnerabilityDetection #DeepProgramAnalysis #AutonomousDiscovery https://zeropath.com/blog/0day-discoveries
Zeropath
Autonomous Discovery of Critical Zero-Days - ZeroPath Blog
Since July 2024, ZeroPath's tool has uncovered critical zero-day vulnerabilities—including RCE, authentication bypasses, and IDORs—in popular AI platforms and open-source projects. Our approach has identified security flaws in projects owned by Netflix, Salesforce…
32 vulnerabilities in IBM Security Verify Access #IBMSecurityVerifyAccess #Vulnerabilities #ITSecurityResearch #AuthenticationBypass #Recommendations https://pierrekim.github.io/blog/2024-11-01-ibm-security-verify-access-32-vulnerabilities.html
HTTP Security Headers: A complete guide to HTTP headers #HTTPSecurityHeaders #CompleteGuide #WebSecurity #HTTPHeaders #RiskMitigation https://www.darkrelay.com/post/http-security-headers
DarkRelay
HTTP Security Headers: A complete guide to HTTP headers
Why did the HTTP security headers go to therapy? They had major 'insecurity' issues!HTTP headers are an integral part of the Hypertext Transfer Protocol (HTTP), the foundation of data communication on the World Wide Web. HTTP headers are lines of additional…
The Sophos kernel implant, ‘hack-back’ implications, CIA malware in Venezuela (podcast) #SophosKernelImplant #HackBack #CIAinVenezuela #CyberEspionage #ThreatIntelligence https://securityconversations.com/episode/the-sophos-kernel-implant-hack-back-implications-cia-malware-in-venezuela/
Security Conversations
The Sophos kernel implant, 'hack-back' implications, CIA malware in Venezuela - Security Conversations
Three Buddy Problem – Episode 19: We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, […]
👍1
ToxicPanda: a new banking trojan from Asia hit Europe and LATAM #ToxicPanda #BankingTrojan #Asia #Europe #LATAM https://www.cleafy.com/cleafy-labs/toxicpanda-a-new-banking-trojan-from-asia-hit-europe-and-latam
Cleafy
ToxicPanda: a new banking trojan from Asia hit Europe and LATAM | Cleafy Labs
Discover Cleafy's in-depth analysis of a new Android banking Trojan campaign, ToxicPanda, initially linked to TgToxic. Our findings reveal a sophisticated fraud operation targeting European and LATAM banks, using On-Device Fraud (ODF) tactics to execute account…